nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network
|
Fu, Anmin |
|
2012 |
31 |
6 |
p. 741-749 9 p. |
artikel |
2 |
Contents
|
|
|
2012 |
31 |
6 |
p. iii- 1 p. |
artikel |
3 |
Editorial
|
Spafford, Eugene H. |
|
2012 |
31 |
6 |
p. 739-740 2 p. |
artikel |
4 |
Editorial Board
|
|
|
2012 |
31 |
6 |
p. IFC- 1 p. |
artikel |
5 |
Engineering a secure mobile messaging framework
|
Castiglione, Aniello |
|
2012 |
31 |
6 |
p. 771-781 11 p. |
artikel |
6 |
Exploiting hash functions to intensify the remote user authentication scheme
|
Hsieh, Wen-Bin |
|
2012 |
31 |
6 |
p. 791-798 8 p. |
artikel |
7 |
Hacking: The Next Generation
|
Michael, Katina |
|
2012 |
31 |
6 |
p. 799- 1 p. |
artikel |
8 |
Impact of HIPAA provisions on the stock market value of healthcare institutions, and information security and other information technology firms
|
Khansa, Lara |
|
2012 |
31 |
6 |
p. 750-770 21 p. |
artikel |
9 |
Inside Cyber Warfare: Mapping the Cyber Underworld
|
Tsoumas, Bill |
|
2012 |
31 |
6 |
p. 801- 1 p. |
artikel |
10 |
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
|
Mylonas, Alexis |
|
2012 |
31 |
6 |
p. 802-803 2 p. |
artikel |
11 |
Real time DDoS detection using fuzzy estimators
|
Shiaeles, Stavros N. |
|
2012 |
31 |
6 |
p. 782-790 9 p. |
artikel |
12 |
The Basics of Digital Forensics
|
Wedge, Tim |
|
2012 |
31 |
6 |
p. 800- 1 p. |
artikel |